Security Bulletin

SonicWall Vulnerability Alert: CVE-2025-32818 | SNWLID-2025-0009

Written by Kyle Sandy | Apr 28, 2025 12:29:06 PM

 

SonicWall CVE-2025-32818: Logically’s Response and Action Plan

 

SonicWall has recently added CVE-2025-32818 to its Known Exploited Vulnerabilities (KEV) Catalog. This critical vulnerability impacts Generation 7 and 8 SonicWall Firewall products running specific firmware versions.

At Logically, we are committed to proactive security and swift action. Below, we outline our planned response to ensure our customers' environments remain secure and resilient.

What is Logically doing?

At Logically, we are committed to ensuring the security of your systems. We have determined that the best course of action is to upgrade affected devices to patched versions of firmware.

What Are We Asking of Our Valued Clients?

If you are a managed service customer with an active Logically support agreement for your SonicWall appliance, we are actively creating service tickets to patch the firmware to a non-affected version. Please respond to the ticket with your desired maintenance window as soon as possible, as upgrading the firmware requires a reboot of the impacted SonicWall device(s), which will temporarily interrupt network availability.

If you are not on a Logically Managed Firewall agreement and operate a device listed as affected, we can still help. Reach out to your Account Manager, Customer Success Manager, or submit a service ticket, and we will coordinate the firmware upgrade for you at a billable rate.

Summary of the Vulnerability:

  • SonicOS SSLVPN NULL Pointer Dereference Denial-of-Service (DoS) Vulnerability: A Null Pointer Dereference vulnerability in the SonicOS SSLVPN Virtual office interface allows a remote, unauthenticated attacker to crash the firewall, potentially leading to a Denial-of-Service (DoS) condition.
  • Affected Firmware Versions: This issue affects only firmware versions 7.1.1-7040 to 7.1.3-7015 & 8.0.0-8037 and earlier versions.
  • Unaffected Versions: SonicOS GEN6 and GEN7 7.0.x firmware versions are not affected by this vulnerability.

What is Known:

SonicWall PSIRT is aware of the vulnerability and has posted recommendations to upgrade devices. There is no evidence that these vulnerabilities are being exploited in the wild, but SonicWall strongly advises users of affected firmware versions to upgrade as soon as possible. Devices with SSL VPN disabled are not affected, and there are no viable workarounds if SSL VPN is enabled.

Affected Products:

  • Gen7 NSv: NSv 270, NSv 470, NSv 870
  • Gen7 Firewalls: TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700, NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700
  • Gen8 Firewall: TZ80

Affected version(s):

  • Gen7 - Version 7.1.1-7040 to 7.1.3-7015 (7.1.x only)
  • Note: 7.0.x was not affected and does not require a patch
  • Gen8 - 8.0.0-8037 and earlier versions

Patched version(s):

  • Gen7 - 7.2.0-7015 and higher (Note: 7.0.x versions were not affected)
  • Gen8 - 8.0.1-8017 and higher

We’ve got your back — our team is already on top of CVE-2025-32818, and we’ll keep working to make sure everyone is safe!